The New York Times describes how hackers made money off the sketchy campaign (and how the poor Flash-using schmucks lost it):

From there, the malware hunted for an out-of-date version of Adobe Flash, which it could use to commandeer the computer — either holding it for ransom until the hackers were paid off or discreetly directing its browser to websites that paid the hackers for traffic.